Giter Site home page Giter Site logo

cve-markdown-charts's Introduction

CVE Markdown Charts

TL;DR - CVE Markdown Charts - Your InfoSec reports will now write themselves...

For the concise summary, stick with this README.

For detailed background, check out the blog post: https://clearbluejar.github.io/posts/introducing-cve-markdown-charts-part-1/

Release

  • [v0.1.0]
    • Initial POC and announcement
  • [v0.2.0]
    • Update CVE data source (switch from mitre to nist)
    • Added pie charts
    • added chromereleasedata
    • workflow change
      • keyword
      • build cve list
      • enrich cve
      • process into chart
    • MSRC cvrf specific charts
    • Google Chrome CVE specific charts
    • Support for multiple keywords
    • New cve list generation
      • cvrf-id (2022-Apr)
      • Microsoft Build Id
      • KB Article Number
      • direct list of CVEs
      • researcher
    • recursive keyword query for large matches
      • supports several thousand CVEs for a generic keyword match
    • async requests for faster retireval with built-in api required delays

Problem

Writing too many infosec reports and manually creating charts and graphs

Idea

Automate it all with a script.

flowchart LR;

a[(Mitre CVEs)] <--> script;
c[(Microsoft CVRFs)] <--> script;
c1[(Other CVE Sources?)] <--> script;
e[CVE search term] --> script;

script --> f[amazing CVE markdown chart]

subgraph script
    d[magic logic]
end

Development

python3 -m venv .env
source .env/bin/activate
pip install -r requirements.txt

Usage

% python cve_markdown_charts.py -h
usage: cve_markdown_charts.py [-h] [--keyword KEYWORD [KEYWORD ...]] [--title TITLE [TITLE ...]] [--researcher | --cvelist | --kb | --winbuild | --cvrfid | --cvrftag | --chromeid] [--start START [START ...]] [--end END [END ...]] keyword [keyword ...]

Generate CVE Markdown Charts

positional arguments:
  keyword               The CVE keyword to chart (default)

optional arguments:
  -h, --help            show this help message and exit
  --keyword KEYWORD [KEYWORD ...]
                        Additional CVE keywords to chart
  --title TITLE [TITLE ...]
                        Set default chart title
  --researcher          Keyword= The researcher CVEs to chart (aka Researcher Vanity Charts)
  --cvelist             Keyword= List of CVEs to chart. Space separated. ex: "CVE-2022-1234 CVE-2022-1235"
  --kb                  Keyword= The KB Article to chart (Windows)
  --winbuild            Keyword= The Windows Build Number to chart (Windows)
  --cvrfid              Keyword= The MSRC Security Update to chart. "Apr-2022" (Windows)
  --cvrftag             Keyword= Specific MSRC CVRF "tag" to chart. "Remote Procedure Call" or "Windows SMB"
  --chromeid            Keyword= Specific Google Release Blog Year-Month to chart. "2022-05" or "2021-01"

CVE List Restrictions:
  --start START [START ...]
                        Start date for CVE published. "3 years ago" or "2020/02/02"
  --end END [END ...]   End date for CVE published. "now" or "2020/02/02"

Sample Chart Output

%python3 cve_markdown_charts.py Windows Print Spooler

Console Output

Building table...
CVE-2022-23284
CVE-2022-22718
CVE-2022-22717
CVE-2022-21999
CVE-2022-21997
CVE-2021-41333
CVE-2021-41332
CVE-2021-40447
CVE-2021-38671
CVE-2021-38667
CVE-2021-36970
CVE-2021-36958
CVE-2021-36947
CVE-2021-36936
CVE-2021-34527
CVE-2021-34483
CVE-2021-34481
CVE-2021-26878
CVE-2021-1695
CVE-2021-1675
CVE-2021-1640
CVE-2020-17042
CVE-2020-17014
CVE-2020-17001
CVE-2020-1337
CVE-2020-1070
CVE-2020-1048
CVE-2020-1030
CVE-2019-0759
CVE-2016-3239
CVE-2016-3238
CVE-2013-1339
CVE-2013-0011
CVE-2012-1851
CVE-2010-2729
CVE-2009-0230
CVE-2009-0229
CVE-2009-0228
CVE-2006-6296
CVE-2005-1984
CVE-2001-1451
CVE-1999-0899
CVE-1999-0898

|CVE|Description|Release Date|KBs|Acknowledgments|
| :---: | :---: | :---: | :---: | :---: |
|[CVE-2022-23284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23284)|Windows Print Spooler Elevation of Privilege Vulnerability.  |[2022-03-08T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-23284)|<details>[10.0.10240.19235](https://support.microsoft.com/help/5011491) - [KB5011491](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011491)<br>[10.0.14393.5006](https://support.microsoft.com/help/5011495) - [KB5011495](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011495)<br>[10.0.17763.2686](https://support.microsoft.com/help/5011503) - [KB5011503](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011503)<br>[10.0.18363.2158](https://support.microsoft.com/help/5011485) - [KB5011485](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011485)<br>[10.0.19042.1586](https://support.microsoft.com/help/5011487) - [KB5011487](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011487)<br>[10.0.19043.1586](https://support.microsoft.com/help/5011487) - [KB5011487](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011487)<br>[10.0.19044.1586](https://support.microsoft.com/help/5011487) - [KB5011487](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011487)<br>[10.0.20348.580](https://support.microsoft.com/help/5011580) - [KB5011580](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011580)<br>[10.0.20348.587](https://support.microsoft.com/help/5011497) - [KB5011497](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011497)<br>[10.0.22000.556](https://support.microsoft.com/help/5011493) - [KB5011493](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011493)<br>[6.2.9200.23639](https://support.microsoft.com/help/5011527) - [KB5011527](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011527)<br>[6.2.9200.23645](https://support.microsoft.com/help/5011535) - [KB5011535](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011535)<br>[6.3.9600.20303](https://support.microsoft.com/help/5011560) - [KB5011560](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011560)<br>[6.3.9600.20303](https://support.microsoft.com/help/5011564) - [KB5011564](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011564)</details>|<a href="https://twitter.com/kkokkokye">JeongOh Kyea</a> with <a href="https://theori.io/">THEORI</a>|
|[CVE-2022-22718](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22718)|Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21997, CVE-2022-21999, CVE-2022-22717.  |[2022-02-08T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-22718)|<details>[10.0.10240.19204](https://support.microsoft.com/help/5010358) - [KB5010358](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358)<br>[10.0.14393.4946](https://support.microsoft.com/help/5010359) - [KB5010359](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359)<br>[10.0.17763.2565](https://support.microsoft.com/help/5010351) - [KB5010351](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351)<br>[10.0.18363.2094](https://support.microsoft.com/help/5010345) - [KB5010345](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345)<br>[10.0.19042.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.19043.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.19044.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.20348.524](https://support.microsoft.com/help/5010354) - [KB5010354](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354)<br>[10.0.20348.525](https://support.microsoft.com/help/5010456) - [KB5010456](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010456)<br>[10.0.22000.493](https://support.microsoft.com/help/5010386) - [KB5010386](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386)<br>[6.0.6003.21372](https://support.microsoft.com/help/5010403) - [KB5010403](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403)<br>[6.0.6003.21374](https://support.microsoft.com/help/5010384) - [KB5010384](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384)<br>[6.1.7601.25860](https://support.microsoft.com/help/5010404) - [KB5010404](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404)<br>[6.1.7601.25860](https://support.microsoft.com/help/5010422) - [KB5010422](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422)<br>[6.2.9200.23605](https://support.microsoft.com/help/5010392) - [KB5010392](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392)<br>[6.2.9200.23605](https://support.microsoft.com/help/5010412) - [KB5010412](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412)<br>[6.3.9600.20269](https://support.microsoft.com/help/5010395) - [KB5010395](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395)<br>[6.3.9600.20269](https://support.microsoft.com/help/5010419) - [KB5010419](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419)</details>|NSFOCUS TIANJI Lab via TianfuCup|
|[CVE-2022-22717](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22717)|Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21997, CVE-2022-21999, CVE-2022-22718.  |[2022-02-08T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-22717)|<details>[10.0.10240.19204](https://support.microsoft.com/help/5010358) - [KB5010358](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358)<br>[10.0.14393.4946](https://support.microsoft.com/help/5010359) - [KB5010359](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359)<br>[10.0.17763.2565](https://support.microsoft.com/help/5010351) - [KB5010351](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351)<br>[10.0.18363.2094](https://support.microsoft.com/help/5010345) - [KB5010345](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345)<br>[10.0.19042.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.19043.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.19044.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.20348.524](https://support.microsoft.com/help/5010354) - [KB5010354](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354)<br>[10.0.20348.525](https://support.microsoft.com/help/5010456) - [KB5010456](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010456)<br>[10.0.22000.493](https://support.microsoft.com/help/5010386) - [KB5010386](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386)<br>[6.0.6003.21372](https://support.microsoft.com/help/5010403) - [KB5010403](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403)<br>[6.0.6003.21374](https://support.microsoft.com/help/5010384) - [KB5010384](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384)<br>[6.1.7601.25860](https://support.microsoft.com/help/5010404) - [KB5010404](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404)<br>[6.1.7601.25860](https://support.microsoft.com/help/5010422) - [KB5010422](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422)<br>[6.2.9200.23605](https://support.microsoft.com/help/5010392) - [KB5010392](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392)<br>[6.2.9200.23605](https://support.microsoft.com/help/5010412) - [KB5010412](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412)<br>[6.3.9600.20269](https://support.microsoft.com/help/5010395) - [KB5010395](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395)<br>[6.3.9600.20269](https://support.microsoft.com/help/5010419) - [KB5010419](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419)</details>|<a href="https://twitter.com/APTeeb0w">Thibault Van Geluwe de Berlaere</a> with <a href="https://www.mandiant.com/">Mandiant</a>|
|[CVE-2022-21999](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21999)|Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21997, CVE-2022-22717, CVE-2022-22718.  |[2022-02-08T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-21999)|<details>[10.0.10240.19204](https://support.microsoft.com/help/5010358) - [KB5010358](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358)<br>[10.0.14393.4946](https://support.microsoft.com/help/5010359) - [KB5010359](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359)<br>[10.0.17763.2565](https://support.microsoft.com/help/5010351) - [KB5010351](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351)<br>[10.0.18363.2094](https://support.microsoft.com/help/5010345) - [KB5010345](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345)<br>[10.0.19042.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.19043.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.19044.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.20348.524](https://support.microsoft.com/help/5010354) - [KB5010354](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354)<br>[10.0.20348.525](https://support.microsoft.com/help/5010456) - [KB5010456](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010456)<br>[10.0.22000.493](https://support.microsoft.com/help/5010386) - [KB5010386](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386)<br>[6.0.6003.21372](https://support.microsoft.com/help/5010403) - [KB5010403](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403)<br>[6.0.6003.21374](https://support.microsoft.com/help/5010384) - [KB5010384](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384)<br>[6.1.7601.25860](https://support.microsoft.com/help/5010404) - [KB5010404](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404)<br>[6.1.7601.25860](https://support.microsoft.com/help/5010422) - [KB5010422](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422)<br>[6.2.9200.23605](https://support.microsoft.com/help/5010392) - [KB5010392](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392)<br>[6.2.9200.23605](https://support.microsoft.com/help/5010412) - [KB5010412](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412)<br>[6.3.9600.20269](https://support.microsoft.com/help/5010395) - [KB5010395](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395)<br>[6.3.9600.20269](https://support.microsoft.com/help/5010419) - [KB5010419](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419)</details>|Xuefeng Li (@lxf02942370) & Zhiniang Peng (@edwardzpeng) of Sangfor Via Tianfu CUP<br><a href="https://twitter.com/ly4k_">Oliver Lyak</a> with <a href="https://ifcr.dk/">Institut For Cyber Risk</a>|
|[CVE-2022-21997](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21997)|Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21999, CVE-2022-22717, CVE-2022-22718.  |[2022-02-08T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-21997)|<details>[10.0.10240.19204](https://support.microsoft.com/help/5010358) - [KB5010358](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358)<br>[10.0.14393.4946](https://support.microsoft.com/help/5010359) - [KB5010359](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359)<br>[10.0.17763.2565](https://support.microsoft.com/help/5010351) - [KB5010351](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351)<br>[10.0.18363.2094](https://support.microsoft.com/help/5010345) - [KB5010345](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345)<br>[10.0.19042.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.19043.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.19044.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.20348.524](https://support.microsoft.com/help/5010354) - [KB5010354](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354)<br>[10.0.20348.525](https://support.microsoft.com/help/5010456) - [KB5010456](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010456)<br>[10.0.22000.493](https://support.microsoft.com/help/5010386) - [KB5010386](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386)<br>[6.0.6003.21372](https://support.microsoft.com/help/5010403) - [KB5010403](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403)<br>[6.0.6003.21374](https://support.microsoft.com/help/5010384) - [KB5010384](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384)<br>[6.1.7601.25860](https://support.microsoft.com/help/5010404) - [KB5010404](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404)<br>[6.1.7601.25860](https://support.microsoft.com/help/5010422) - [KB5010422](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422)<br>[6.2.9200.23605](https://support.microsoft.com/help/5010392) - [KB5010392](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392)<br>[6.2.9200.23605](https://support.microsoft.com/help/5010412) - [KB5010412](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412)<br>[6.3.9600.20269](https://support.microsoft.com/help/5010395) - [KB5010395](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395)<br>[6.3.9600.20269](https://support.microsoft.com/help/5010419) - [KB5010419](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419)</details>|<a href="https://wubonetcn.github.io/">Bo Wu</a>|
|[CVE-2021-41333](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41333)|Windows Print Spooler Elevation of Privilege Vulnerability  |[2021-12-14T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41333)|<details>[10.0.10240.19145](https://support.microsoft.com/help/5008230) - [KB5008230](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008230)<br>[10.0.14393.4825](https://support.microsoft.com/help/5008207) - [KB5008207](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008207)<br>[10.0.17763.2366](https://support.microsoft.com/help/5008218) - [KB5008218](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218)<br>[10.0.18363.1977](https://support.microsoft.com/help/5008206) - [KB5008206](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008206)<br>[10.0.19041.1415](https://support.microsoft.com/help/5008212) - [KB5008212](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008212)<br>[10.0.19042.1415](https://support.microsoft.com/help/5008212) - [KB5008212](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008212)<br>[10.0.19043.1415](https://support.microsoft.com/help/5008212) - [KB5008212](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008212)<br>[10.0.19044.1415](https://support.microsoft.com/help/5008212) - [KB5008212](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008212)<br>[10.0.20348.405](https://support.microsoft.com/help/5008223) - [KB5008223](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008223)<br>[10.0.22000.376](https://support.microsoft.com/help/5008215) - [KB5008215](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008215)<br>[6.0.6003.21309](https://support.microsoft.com/help/5008271) - [KB5008271](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008271)<br>[6.0.6003.21309](https://support.microsoft.com/help/5008274) - [KB5008274](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008274)<br>[6.1.7601.25796](https://support.microsoft.com/help/5008244) - [KB5008244](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008244)<br>[6.1.7601.25796](https://support.microsoft.com/help/5008282) - [KB5008282](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008282)<br>[6.2.9200.23540](https://support.microsoft.com/help/5008255) - [KB5008255](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008255)<br>[6.2.9200.23545](https://support.microsoft.com/help/5008277) - [KB5008277](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008277)<br>[6.3.9600.20207](https://support.microsoft.com/help/5008263) - [KB5008263](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008263)<br>[6.3.9600.20207](https://support.microsoft.com/help/5008285) - [KB5008285](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008285)</details>|James Forshaw of <a href="http://www.google.com/">Google Project Zero</a><br>Abdelhamid Naceri working with <a href="https://www.zerodayinitiative.com/">Trend Micro Zero Day Initiative</a>|
|[CVE-2021-41332](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41332)|Windows Print Spooler Information Disclosure Vulnerability  |[2021-10-12T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41332)|<details>[10.0.10240.19086](https://support.microsoft.com/help/5006675) - [KB5006675](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006675)<br>[10.0.14393.4704](https://support.microsoft.com/help/5006669) - [KB5006669](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006669)<br>[10.0.17763.2237](https://support.microsoft.com/help/5006672) - [KB5006672](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006672)<br>[10.0.18363.1854](https://support.microsoft.com/help/5006667) - [KB5006667](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006667)<br>[10.0.19041.1288](https://support.microsoft.com/help/5006670) - [KB5006670](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670)<br>[10.0.19042.1288](https://support.microsoft.com/help/5006670) - [KB5006670](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670)<br>[10.0.20348.288](https://support.microsoft.com/help/5006699) - [KB5006699](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006699)<br>[10.0.22000.258](https://support.microsoft.com/help/5006674) - [KB5006674](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006674)<br>[6.0.6003.21251](https://support.microsoft.com/help/5006715) - [KB5006715](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006715)<br>[6.0.6003.21251](https://support.microsoft.com/help/5006736) - [KB5006736](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006736)<br>[6.1.7601.25740](https://support.microsoft.com/help/5006728) - [KB5006728](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006728)<br>[6.1.7601.25740](https://support.microsoft.com/help/5006743) - [KB5006743](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006743)<br>[6.2.9200.23490](https://support.microsoft.com/help/5006732) - [KB5006732](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006732)<br>[6.2.9200.23490](https://support.microsoft.com/help/5006739) - [KB5006739](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006739)<br>[6.3.9600.20144](https://support.microsoft.com/help/5006714) - [KB5006714](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006714)<br>[6.3.9600.20144](https://support.microsoft.com/help/5006729) - [KB5006729](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006729)</details>|Liubenjin  with Codesafe Team of Legendsec at Qi'anxin Group|
|[CVE-2021-40447](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40447)|Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38667, CVE-2021-38671.  |[2021-09-14T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-40447)|<details>[10.0.10240.19060](https://support.microsoft.com/help/5005569) - [KB5005569](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005569)<br>[10.0.14393.4651](https://support.microsoft.com/help/5005573) - [KB5005573](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005573)<br>[10.0.17763.2183](https://support.microsoft.com/help/5005568) - [KB5005568](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568)<br>[10.0.18363.1801](https://support.microsoft.com/help/5005566) - [KB5005566](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005566)<br>[10.0.19043.1237](https://support.microsoft.com/help/5005565) - [KB5005565](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005565)<br>[10.0.20348.230](https://support.microsoft.com/help/5005575) - [KB5005575](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005575)<br>[6.0.6003.21218](https://support.microsoft.com/help/5005606) - [KB5005606](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005606)<br>[6.0.6003.21218](https://support.microsoft.com/help/5005618) - [KB5005618](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005618)<br>[6.1.7601.25712](https://support.microsoft.com/help/5005615) - [KB5005615](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005615)<br>[6.1.7601.25712](https://support.microsoft.com/help/5005633) - [KB5005633](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005633)<br>[6.2.9200.23462](https://support.microsoft.com/help/5005607) - [KB5005607](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005607)<br>[6.2.9200.23462](https://support.microsoft.com/help/5005623) - [KB5005623](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005623)<br>[6.3.9600.20120](https://support.microsoft.com/help/5005613) - [KB5005613](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005613)<br>[6.3.9600.20120](https://support.microsoft.com/help/5005627) - [KB5005627](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005627)</details>||
|[CVE-2021-38671](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38671)|Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38667, CVE-2021-40447.  |[2021-09-14T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-38671)|<details>[10.0.10240.19060](https://support.microsoft.com/help/5005569) - [KB5005569](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005569)<br>[10.0.14393.4651](https://support.microsoft.com/help/5005573) - [KB5005573](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005573)<br>[10.0.17763.2183](https://support.microsoft.com/help/5005568) - [KB5005568](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568)<br>[10.0.18363.1801](https://support.microsoft.com/help/5005566) - [KB5005566](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005566)<br>[10.0.19043.1237](https://support.microsoft.com/help/5005565) - [KB5005565](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005565)<br>[10.0.20348.230](https://support.microsoft.com/help/5005575) - [KB5005575](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005575)<br>[6.0.6003.21218](https://support.microsoft.com/help/5005606) - [KB5005606](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005606)<br>[6.0.6003.21218](https://support.microsoft.com/help/5005618) - [KB5005618](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005618)<br>[6.1.7601.25712](https://support.microsoft.com/help/5005615) - [KB5005615](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005615)<br>[6.1.7601.25712](https://support.microsoft.com/help/5005633) - [KB5005633](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005633)<br>[6.2.9200.23462](https://support.microsoft.com/help/5005607) - [KB5005607](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005607)<br>[6.2.9200.23462](https://support.microsoft.com/help/5005623) - [KB5005623](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005623)<br>[6.3.9600.20120](https://support.microsoft.com/help/5005613) - [KB5005613](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005613)<br>[6.3.9600.20120](https://support.microsoft.com/help/5005627) - [KB5005627](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005627)</details>|<a href="https://twitter.com/tvgdb2">Thibault Van Geluwe de Berlaere</a> with <a href="https://www.mandiant.com/">Mandiant</a>|
|[CVE-2021-38667](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38667)|Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38671, CVE-2021-40447.  |[2021-09-14T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-38667)|<details>[10.0.10240.19060](https://support.microsoft.com/help/5005569) - [KB5005569](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005569)<br>[10.0.14393.4651](https://support.microsoft.com/help/5005573) - [KB5005573](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005573)<br>[10.0.17763.2183](https://support.microsoft.com/help/5005568) - [KB5005568](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568)<br>[10.0.18363.1801](https://support.microsoft.com/help/5005566) - [KB5005566](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005566)<br>[10.0.19043.1237](https://support.microsoft.com/help/5005565) - [KB5005565](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005565)<br>[10.0.20348.230](https://support.microsoft.com/help/5005575) - [KB5005575](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005575)<br>[6.0.6003.21218](https://support.microsoft.com/help/5005606) - [KB5005606](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005606)<br>[6.0.6003.21218](https://support.microsoft.com/help/5005618) - [KB5005618](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005618)<br>[6.1.7601.25712](https://support.microsoft.com/help/5005615) - [KB5005615](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005615)<br>[6.1.7601.25712](https://support.microsoft.com/help/5005633) - [KB5005633](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005633)<br>[6.2.9200.23462](https://support.microsoft.com/help/5005607) - [KB5005607](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005607)<br>[6.2.9200.23462](https://support.microsoft.com/help/5005623) - [KB5005623](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005623)<br>[6.3.9600.20120](https://support.microsoft.com/help/5005613) - [KB5005613](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005613)<br>[6.3.9600.20120](https://support.microsoft.com/help/5005627) - [KB5005627](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005627)</details>||
|[CVE-2021-36970](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36970)|Windows Print Spooler Spoofing Vulnerability  |[2021-10-12T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-36970)|<details>[10.0.10240.19086](https://support.microsoft.com/help/5006675) - [KB5006675](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006675)<br>[10.0.14393.4704](https://support.microsoft.com/help/5006669) - [KB5006669](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006669)<br>[10.0.17763.2237](https://support.microsoft.com/help/5006672) - [KB5006672](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006672)<br>[10.0.18363.1854](https://support.microsoft.com/help/5006667) - [KB5006667](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006667)<br>[10.0.19041.1288](https://support.microsoft.com/help/5006670) - [KB5006670](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670)<br>[10.0.19042.1288](https://support.microsoft.com/help/5006670) - [KB5006670](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670)<br>[10.0.20348.288](https://support.microsoft.com/help/5006699) - [KB5006699](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006699)<br>[10.0.22000.258](https://support.microsoft.com/help/5006674) - [KB5006674](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006674)<br>[6.0.6003.21251](https://support.microsoft.com/help/5006715) - [KB5006715](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006715)<br>[6.0.6003.21251](https://support.microsoft.com/help/5006736) - [KB5006736](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006736)<br>[6.1.7601.25740](https://support.microsoft.com/help/5006728) - [KB5006728](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006728)<br>[6.1.7601.25740](https://support.microsoft.com/help/5006743) - [KB5006743](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006743)<br>[6.2.9200.23490](https://support.microsoft.com/help/5006732) - [KB5006732](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006732)<br>[6.2.9200.23490](https://support.microsoft.com/help/5006739) - [KB5006739](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006739)<br>[6.3.9600.20144](https://support.microsoft.com/help/5006714) - [KB5006714](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006714)<br>[6.3.9600.20144](https://support.microsoft.com/help/5006729) - [KB5006729](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006729)</details>|<a href="https://twitter.com/lxf02942370">XueFeng Li</a> and <a href="https://twitter.com/edwardzpeng">Zhiniang Peng</a> with <a href="https://www.sangfor.com/">Sangfor</a>|
|[CVE-2021-36958](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36958)|Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36936, CVE-2021-36947.  |[2021-08-10T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-36958)|<details>[10.0.10240.19060](https://support.microsoft.com/help/5005569) - [KB5005569](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005569)<br>[10.0.14393.4651](https://support.microsoft.com/help/5005573) - [KB5005573](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005573)<br>[10.0.17763.2183](https://support.microsoft.com/help/5005568) - [KB5005568](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568)<br>[10.0.18363.1801](https://support.microsoft.com/help/5005566) - [KB5005566](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005566)<br>[10.0.19041.1237](https://support.microsoft.com/help/5005565) - [KB5005565](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005565)<br>[10.0.19042.1237](https://support.microsoft.com/help/5005565) - [KB5005565](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005565)<br>[10.0.19043.1237](https://support.microsoft.com/help/5005565) - [KB5005565](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005565)<br>[6.0.6003.21218](https://support.microsoft.com/help/5005606) - [KB5005606](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005606)<br>[6.0.6003.21218](https://support.microsoft.com/help/5005618) - [KB5005618](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005618)<br>[6.1.7601.25712](https://support.microsoft.com/help/5005615) - [KB5005615](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005615)<br>[6.1.7601.25712](https://support.microsoft.com/help/5005633) - [KB5005633](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005633)<br>[6.2.9200.23462](https://support.microsoft.com/help/5005607) - [KB5005607](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005607)<br>[6.2.9200.23462](https://support.microsoft.com/help/5005623) - [KB5005623](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005623)<br>[6.3.9600.20120](https://support.microsoft.com/help/5005613) - [KB5005613](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005613)<br>[6.3.9600.20120](https://support.microsoft.com/help/5005627) - [KB5005627](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005627)</details>|<a href="https://twitter.com/offenseindepth">Victor Mata</a> of FusionX, Accenture Security|
|[CVE-2021-36947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36947)|Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36936, CVE-2021-36958.  |[2021-08-10T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-36947)|<details>[10.0.10240.19022](https://support.microsoft.com/help/5005040) - [KB5005040](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040)<br>[10.0.14393.4583](https://support.microsoft.com/help/5005043) - [KB5005043](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043)<br>[10.0.17763.2114](https://support.microsoft.com/help/5005030) - [KB5005030](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030)<br>[10.0.18363.1734](https://support.microsoft.com/help/5005031) - [KB5005031](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031)<br>[10.0.19041.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[10.0.19042.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[10.0.19043.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[6.0.6003.21192](https://support.microsoft.com/help/5005090) - [KB5005090](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090)<br>[6.0.6003.21192](https://support.microsoft.com/help/5005095) - [KB5005095](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095)<br>[6.1.7601.25685](https://support.microsoft.com/help/5005088) - [KB5005088](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088)<br>[6.1.7601.25685](https://support.microsoft.com/help/5005089) - [KB5005089](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089)<br>[6.2.9200.23435](https://support.microsoft.com/help/5005094) - [KB5005094](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094)<br>[6.2.9200.23435](https://support.microsoft.com/help/5005099) - [KB5005099](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099)<br>[6.3.9600.20094](https://support.microsoft.com/help/5005076) - [KB5005076](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076)<br>[6.3.9600.20094](https://support.microsoft.com/help/5005106) - [KB5005106](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106)</details>||
|[CVE-2021-36936](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36936)|Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36947, CVE-2021-36958.  |[2021-08-10T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-36936)|<details>[10.0.10240.19022](https://support.microsoft.com/help/5005040) - [KB5005040](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040)<br>[10.0.14393.4583](https://support.microsoft.com/help/5005043) - [KB5005043](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043)<br>[10.0.17763.2114](https://support.microsoft.com/help/5005030) - [KB5005030](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030)<br>[10.0.18363.1734](https://support.microsoft.com/help/5005031) - [KB5005031](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031)<br>[10.0.19041.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[10.0.19042.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[10.0.19043.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[6.0.6003.21192](https://support.microsoft.com/help/5005090) - [KB5005090](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090)<br>[6.0.6003.21192](https://support.microsoft.com/help/5005095) - [KB5005095](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095)<br>[6.1.7601.25685](https://support.microsoft.com/help/5005088) - [KB5005088](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088)<br>[6.1.7601.25685](https://support.microsoft.com/help/5005089) - [KB5005089](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089)<br>[6.2.9200.23435](https://support.microsoft.com/help/5005094) - [KB5005094](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094)<br>[6.2.9200.23435](https://support.microsoft.com/help/5005099) - [KB5005099](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099)<br>[6.3.9600.20094](https://support.microsoft.com/help/5005076) - [KB5005076](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076)<br>[6.3.9600.20094](https://support.microsoft.com/help/5005106) - [KB5005106](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106)</details>||
|[CVE-2021-34527](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527)|Windows Print Spooler Remote Code Execution Vulnerability  |[2021-07-13T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34527)|<details>[10.0.10240.18969](https://support.microsoft.com/help/5004950) - [KB5004950](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004950)<br>[10.0.17763.2029](https://support.microsoft.com/help/5004947) - [KB5004947](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004947)<br>[10.0.18363.1646](https://support.microsoft.com/help/5004946) - [KB5004946](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004946)<br>[10.0.19041.1083](https://support.microsoft.com/help/5004945) - [KB5004945](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004945)<br>[10.0.19042.1083](https://support.microsoft.com/help/5004945) - [KB5004945](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004945)<br>[10.0.19043.1083](https://support.microsoft.com/help/5004945) - [KB5004945](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004945)<br>[6.0.6003.21138](https://support.microsoft.com/help/5004955) - [KB5004955](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004955)<br>[6.0.6003.21138](https://support.microsoft.com/help/5004959) - [KB5004959](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004959)<br>[6.1.7601.25633](https://support.microsoft.com/help/5004951) - [KB5004951](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004951)<br>[6.1.7601.25633](https://support.microsoft.com/help/5004953) - [KB5004953](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004953)<br>[6.3.9600.20046](https://support.microsoft.com/help/5004954) - [KB5004954](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004954)<br>[6.3.9600.20046](https://support.microsoft.com/help/5004958) - [KB5004958](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004958)<br>[None](https://support.microsoft.com/help/5004948) - [KB5004948](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004948)<br>[None](https://support.microsoft.com/help/5004956) - [KB5004956](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004956)<br>[None](https://support.microsoft.com/help/5004960) - [KB5004960](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004960)</details>|Zhiniang Peng (<a href="https://twitter.com/edwardzpeng/">@edwardzpeng</a>) and Xuefeng Li (<a href="https://twitter.com/lxf02942370/">@lxf02942370</a>)|
|[CVE-2021-34483](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34483)|Windows Print Spooler Elevation of Privilege Vulnerability  |[2021-08-10T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34483)|<details>[10.0.10240.19022](https://support.microsoft.com/help/5005040) - [KB5005040](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040)<br>[10.0.14393.4583](https://support.microsoft.com/help/5005043) - [KB5005043](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043)<br>[10.0.17763.2114](https://support.microsoft.com/help/5005030) - [KB5005030](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030)<br>[10.0.18363.1734](https://support.microsoft.com/help/5005031) - [KB5005031](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031)<br>[10.0.19041.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[10.0.19042.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[10.0.19043.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[6.0.6003.21192](https://support.microsoft.com/help/5005090) - [KB5005090](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090)<br>[6.0.6003.21192](https://support.microsoft.com/help/5005095) - [KB5005095](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095)<br>[6.1.7601.25685](https://support.microsoft.com/help/5005088) - [KB5005088](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088)<br>[6.1.7601.25685](https://support.microsoft.com/help/5005089) - [KB5005089](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089)<br>[6.2.9200.23435](https://support.microsoft.com/help/5005094) - [KB5005094](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094)<br>[6.2.9200.23435](https://support.microsoft.com/help/5005099) - [KB5005099](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099)<br>[6.3.9600.20094](https://support.microsoft.com/help/5005076) - [KB5005076](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076)<br>[6.3.9600.20094](https://support.microsoft.com/help/5005106) - [KB5005106](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106)</details>|Thibault van Geluwe<br>[Victor Mata](https://twitter.com/offenseindepth) of FusionX, Accenture Security|
|[CVE-2021-34481](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34481)|Windows Print Spooler Elevation of Privilege Vulnerability  |[2021-07-13T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34481)|<details>[10.0.10240.19022](https://support.microsoft.com/help/5005040) - [KB5005040](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040)<br>[10.0.14393.4583](https://support.microsoft.com/help/5005043) - [KB5005043](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043)<br>[10.0.17763.2114](https://support.microsoft.com/help/5005030) - [KB5005030](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030)<br>[10.0.18363.1734](https://support.microsoft.com/help/5005031) - [KB5005031](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031)<br>[10.0.19041.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[10.0.19042.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[10.0.19043.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[6.0.6003.21192](https://support.microsoft.com/help/5005090) - [KB5005090](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090)<br>[6.0.6003.21192](https://support.microsoft.com/help/5005095) - [KB5005095](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095)<br>[6.1.7601.25685](https://support.microsoft.com/help/5005088) - [KB5005088](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088)<br>[6.1.7601.25685](https://support.microsoft.com/help/5005089) - [KB5005089](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089)<br>[6.2.9200.23435](https://support.microsoft.com/help/5005094) - [KB5005094](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094)<br>[6.2.9200.23435](https://support.microsoft.com/help/5005099) - [KB5005099](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099)<br>[6.3.9600.20094](https://support.microsoft.com/help/5005076) - [KB5005076](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076)<br>[6.3.9600.20094](https://support.microsoft.com/help/5005106) - [KB5005106](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106)</details>|<a href="https://twitter.com/Junior_Baines">Jacob Baines</a>|
|[CVE-2021-26878](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26878)|Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1640.  |[2021-03-09T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26878)|<details>[None](https://support.microsoft.com/help/5000802) - [KB5000802](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000802)<br>[None](https://support.microsoft.com/help/5000803) - [KB5000803](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000803)<br>[None](https://support.microsoft.com/help/5000807) - [KB5000807](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000807)<br>[None](https://support.microsoft.com/help/5000808) - [KB5000808](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000808)<br>[None](https://support.microsoft.com/help/5000809) - [KB5000809](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000809)<br>[None](https://support.microsoft.com/help/5000822) - [KB5000822](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000822)<br>[None](https://support.microsoft.com/help/5000840) - [KB5000840](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000840)<br>[None](https://support.microsoft.com/help/5000841) - [KB5000841](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000841)<br>[None](https://support.microsoft.com/help/5000844) - [KB5000844](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000844)<br>[None](https://support.microsoft.com/help/5000847) - [KB5000847](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000847)<br>[None](https://support.microsoft.com/help/5000848) - [KB5000848](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000848)<br>[None](https://support.microsoft.com/help/5000851) - [KB5000851](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000851)<br>[None](https://support.microsoft.com/help/5000853) - [KB5000853](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000853)<br>[None](https://support.microsoft.com/help/5000856) - [KB5000856](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000856)</details>|x<br>None<br>This vulnerability was discovered by Bryan de Houwer and Thibault van Geluwe de Berlaere.|
|[CVE-2021-1695](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1695)|Windows Print Spooler Elevation of Privilege Vulnerability  |[2021-01-12T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1695)|<details>[None](https://support.microsoft.com/help/4598229) - [KB4598229](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598229)<br>[None](https://support.microsoft.com/help/4598230) - [KB4598230](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598230)<br>[None](https://support.microsoft.com/help/4598231) - [KB4598231](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598231)<br>[None](https://support.microsoft.com/help/4598242) - [KB4598242](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242)<br>[None](https://support.microsoft.com/help/4598243) - [KB4598243](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598243)<br>[None](https://support.microsoft.com/help/4598245) - [KB4598245](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598245)<br>[None](https://support.microsoft.com/help/4598275) - [KB4598275](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598275)<br>[None](https://support.microsoft.com/help/4598278) - [KB4598278](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598278)<br>[None](https://support.microsoft.com/help/4598279) - [KB4598279](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598279)<br>[None](https://support.microsoft.com/help/4598285) - [KB4598285](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598285)<br>[None](https://support.microsoft.com/help/4598287) - [KB4598287](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598287)<br>[None](https://support.microsoft.com/help/4598288) - [KB4598288](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598288)<br>[None](https://support.microsoft.com/help/4598289) - [KB4598289](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598289)<br>[None](https://support.microsoft.com/help/4598297) - [KB4598297](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598297)</details>|<a href="https://twitter.com/kkokkokye">JeongOh Kyea</a> of THEORI working with Trend Micro Zero Day Initiative|
|[CVE-2021-1675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1675)|Windows Print Spooler Elevation of Privilege Vulnerability  |[2021-06-08T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1675)|<details>[10.0.10240.18967](https://support.microsoft.com/help/5003687) - [KB5003687](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003687)<br>[10.0.14393.4467](https://support.microsoft.com/help/5003638) - [KB5003638](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003638)<br>[10.0.17763.1999](https://support.microsoft.com/help/5003646) - [KB5003646](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646)<br>[10.0.18363.1621](https://support.microsoft.com/help/5003635) - [KB5003635](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003635)<br>[10.0.19041.1052](https://support.microsoft.com/help/5003637) - [KB5003637](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003637)<br>[10.0.19042.1052](https://support.microsoft.com/help/5003637) - [KB5003637](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003637)<br>[10.0.19043.1052](https://support.microsoft.com/help/5003637) - [KB5003637](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003637)<br>[6.0.6003.21137](https://support.microsoft.com/help/5003661) - [KB5003661](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003661)<br>[6.0.6003.21137](https://support.microsoft.com/help/5003695) - [KB5003695](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003695)<br>[6.1.7601.25632](https://support.microsoft.com/help/5003667) - [KB5003667](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003667)<br>[6.1.7601.25632](https://support.microsoft.com/help/5003694) - [KB5003694](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003694)<br>[6.2.9200.23372](https://support.microsoft.com/help/5003696) - [KB5003696](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003696)<br>[6.2.9200.23372](https://support.microsoft.com/help/5003697) - [KB5003697](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003697)<br>[6.3.9600.20044](https://support.microsoft.com/help/5003681) - [KB5003681](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003681)<br>[6.3.9600.20045](https://support.microsoft.com/help/5003671) - [KB5003671](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003671)</details>|Yunhai Zhang of NSFOCUS TIANJI LAB https://www.nsfocus.com.cn/<br><a href="https://www.linkedin.com/in/piotr-madej-18b0bb38/">Piotr Madej of AFINE</a><br><a href="">Zhipeng Huo  (@R3dF09) </a> of <a href="https://xlab.tencent.com">Tencent Security Xuanwu Lab </a>|
|[CVE-2021-1640](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1640)|Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26878.  |[2021-03-09T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1640)|<details>[None](https://support.microsoft.com/help/5000802) - [KB5000802](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000802)<br>[None](https://support.microsoft.com/help/5000803) - [KB5000803](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000803)<br>[None](https://support.microsoft.com/help/5000807) - [KB5000807](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000807)<br>[None](https://support.microsoft.com/help/5000808) - [KB5000808](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000808)<br>[None](https://support.microsoft.com/help/5000809) - [KB5000809](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000809)<br>[None](https://support.microsoft.com/help/5000822) - [KB5000822](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000822)<br>[None](https://support.microsoft.com/help/5000840) - [KB5000840](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000840)<br>[None](https://support.microsoft.com/help/5000841) - [KB5000841](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000841)<br>[None](https://support.microsoft.com/help/5000844) - [KB5000844](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000844)<br>[None](https://support.microsoft.com/help/5000847) - [KB5000847](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000847)<br>[None](https://support.microsoft.com/help/5000848) - [KB5000848](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000848)<br>[None](https://support.microsoft.com/help/5000851) - [KB5000851](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000851)<br>[None](https://support.microsoft.com/help/5000853) - [KB5000853](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000853)<br>[None](https://support.microsoft.com/help/5000856) - [KB5000856](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000856)</details>|Blaz Satler and Ziga Sumenjak of <a href="https://0patch.com">0patch</a><br>JeongOh Kyea (@kkokkokye) of THEORI working with <a href="https://www.zerodayinitiative.com/">Trend Micro Zero Day Initiative</a>|
|[CVE-2020-17042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17042)|Windows Print Spooler Remote Code Execution Vulnerability  |[2020-11-10T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17042)|<details>[None](https://support.microsoft.com/help/4586781) - [KB4586781](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586781)<br>[None](https://support.microsoft.com/help/4586785) - [KB4586785](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586785)<br>[None](https://support.microsoft.com/help/4586786) - [KB4586786](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586786)<br>[None](https://support.microsoft.com/help/4586787) - [KB4586787](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586787)<br>[None](https://support.microsoft.com/help/4586793) - [KB4586793](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586793)<br>[None](https://support.microsoft.com/help/4586805) - [KB4586805](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586805)<br>[None](https://support.microsoft.com/help/4586807) - [KB4586807](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586807)<br>[None](https://support.microsoft.com/help/4586808) - [KB4586808](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586808)<br>[None](https://support.microsoft.com/help/4586817) - [KB4586817](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586817)<br>[None](https://support.microsoft.com/help/4586823) - [KB4586823](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586823)<br>[None](https://support.microsoft.com/help/4586827) - [KB4586827](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586827)<br>[None](https://support.microsoft.com/help/4586830) - [KB4586830](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586830)<br>[None](https://support.microsoft.com/help/4586834) - [KB4586834](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586834)<br>[None](https://support.microsoft.com/help/4586845) - [KB4586845](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586845)</details>|HyungSeok Han(@DaramG) and JeongOh Kyea(@kkokkokye) of THEORI|
|[CVE-2020-17014](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17014)|Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17001.  |[2020-11-10T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17014)|<details>[None](https://support.microsoft.com/help/4586781) - [KB4586781](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586781)<br>[None](https://support.microsoft.com/help/4586785) - [KB4586785](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586785)<br>[None](https://support.microsoft.com/help/4586786) - [KB4586786](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586786)<br>[None](https://support.microsoft.com/help/4586787) - [KB4586787](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586787)<br>[None](https://support.microsoft.com/help/4586793) - [KB4586793](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586793)<br>[None](https://support.microsoft.com/help/4586805) - [KB4586805](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586805)<br>[None](https://support.microsoft.com/help/4586807) - [KB4586807](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586807)<br>[None](https://support.microsoft.com/help/4586808) - [KB4586808](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586808)<br>[None](https://support.microsoft.com/help/4586817) - [KB4586817](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586817)<br>[None](https://support.microsoft.com/help/4586823) - [KB4586823](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586823)<br>[None](https://support.microsoft.com/help/4586827) - [KB4586827](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586827)<br>[None](https://support.microsoft.com/help/4586830) - [KB4586830](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586830)<br>[None](https://support.microsoft.com/help/4586834) - [KB4586834](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586834)<br>[None](https://support.microsoft.com/help/4586845) - [KB4586845](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586845)</details>|Zhiniang Peng (<a href="https://twitter.com/edwardzpeng">@edwardzpeng</a> & Xuefeng Li (<a href="https://twitter.com/lxf02942370">@lxf02942370</a><br>JeongOh Kyea (@kkokkokye) of THEORI working with Trend Micro Zero Day Initiative|
|[CVE-2020-17001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17001)|Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17014.  |[2020-11-10T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17001)|<details>[None](https://support.microsoft.com/help/4586781) - [KB4586781](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586781)<br>[None](https://support.microsoft.com/help/4586785) - [KB4586785](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586785)<br>[None](https://support.microsoft.com/help/4586786) - [KB4586786](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586786)<br>[None](https://support.microsoft.com/help/4586787) - [KB4586787](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586787)<br>[None](https://support.microsoft.com/help/4586793) - [KB4586793](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586793)<br>[None](https://support.microsoft.com/help/4586805) - [KB4586805](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586805)<br>[None](https://support.microsoft.com/help/4586807) - [KB4586807](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586807)<br>[None](https://support.microsoft.com/help/4586808) - [KB4586808](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586808)<br>[None](https://support.microsoft.com/help/4586817) - [KB4586817](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586817)<br>[None](https://support.microsoft.com/help/4586823) - [KB4586823](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586823)<br>[None](https://support.microsoft.com/help/4586827) - [KB4586827](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586827)<br>[None](https://support.microsoft.com/help/4586830) - [KB4586830](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586830)<br>[None](https://support.microsoft.com/help/4586834) - [KB4586834](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586834)<br>[None](https://support.microsoft.com/help/4586845) - [KB4586845](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586845)</details>|James Forshaw of <a href="http://www.google.com/">Google Project Zero</a>|
|[CVE-2020-1337](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1337)|An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka &#x27;Windows Print Spooler Elevation of Privilege Vulnerability&#x27;.  |[2020-08-11T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1337)|<details>[None](https://support.microsoft.com/help/4565349) - [KB4565349](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4565349)<br>[None](https://support.microsoft.com/help/4565351) - [KB4565351](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4565351)<br>[None](https://support.microsoft.com/help/4566782) - [KB4566782](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4566782)<br>[None](https://support.microsoft.com/help/4571692) - [KB4571692](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571692)<br>[None](https://support.microsoft.com/help/4571694) - [KB4571694](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571694)<br>[None](https://support.microsoft.com/help/4571702) - [KB4571702](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571702)<br>[None](https://support.microsoft.com/help/4571703) - [KB4571703](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571703)<br>[None](https://support.microsoft.com/help/4571709) - [KB4571709](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571709)<br>[None](https://support.microsoft.com/help/4571719) - [KB4571719](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571719)<br>[None](https://support.microsoft.com/help/4571723) - [KB4571723](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571723)<br>[None](https://support.microsoft.com/help/4571729) - [KB4571729](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571729)<br>[None](https://support.microsoft.com/help/4571730) - [KB4571730](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571730)<br>[None](https://support.microsoft.com/help/4571736) - [KB4571736](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571736)<br>[None](https://support.microsoft.com/help/4571741) - [KB4571741](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571741)<br>[None](https://support.microsoft.com/help/4571746) - [KB4571746](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571746)</details>|Peleg Hadar (<a href="https://twitter.com/peleghd">@peleghd</a>) and Tomer Bar of SafeBreach Labs.<br>EoP Master working with <a href="https://vcp.idefense.com">iDefense Labs</a>, Accenture. <br>Vte. Javier García Mayén<br>Junyu Zhou (<a href="https://twitter.com/md5_salt">@md5_salt</a>) of Tencent Security Xuanwu Lab and Wenxu Wu<br>Anonymous working with <a href="https://www.zerodayinitiative.com/">Trend Micro's Zero Day Initiative</a><br>Alex Ionescu, <a href="https://www.crowdstrike.com">CrowdStrike Inc.</a><br>Paolo Stagno aka <a href="https://voidsec.com">VoidSec</a><br>Zhiniang Peng <a href="https://twitter.com/edwardzpeng">(@edwardzpeng)</a> & Xuefeng Li|
|[CVE-2020-1070](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1070)|An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka &#x27;Windows Print Spooler Elevation of Privilege Vulnerability&#x27;. This CVE ID is unique from CVE-2020-1048.  |[2020-05-12T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1070)|<details>[None](https://support.microsoft.com/help/4551853) - [KB4551853](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4551853)<br>[None](https://support.microsoft.com/help/4556799) - [KB4556799](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556799)<br>[None](https://support.microsoft.com/help/4556807) - [KB4556807](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556807)<br>[None](https://support.microsoft.com/help/4556812) - [KB4556812](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556812)<br>[None](https://support.microsoft.com/help/4556813) - [KB4556813](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556813)<br>[None](https://support.microsoft.com/help/4556826) - [KB4556826](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556826)<br>[None](https://support.microsoft.com/help/4556836) - [KB4556836](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556836)<br>[None](https://support.microsoft.com/help/4556840) - [KB4556840](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556840)<br>[None](https://support.microsoft.com/help/4556843) - [KB4556843](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556843)<br>[None](https://support.microsoft.com/help/4556846) - [KB4556846](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556846)<br>[None](https://support.microsoft.com/help/4556852) - [KB4556852](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556852)<br>[None](https://support.microsoft.com/help/4556853) - [KB4556853](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556853)<br>[None](https://support.microsoft.com/help/4556854) - [KB4556854](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556854)<br>[None](https://support.microsoft.com/help/4556860) - [KB4556860](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556860)</details>|<a href="https://twitter.com/kkokkokye">JeongOh Kyea</a> of THEORI|
|[CVE-2020-1048](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1048)|An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka &#x27;Windows Print Spooler Elevation of Privilege Vulnerability&#x27;. This CVE ID is unique from CVE-2020-1070.  |[2020-05-12T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1048)|<details>[None](https://support.microsoft.com/help/4551853) - [KB4551853](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4551853)<br>[None](https://support.microsoft.com/help/4556799) - [KB4556799](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556799)<br>[None](https://support.microsoft.com/help/4556807) - [KB4556807](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556807)<br>[None](https://support.microsoft.com/help/4556812) - [KB4556812](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556812)<br>[None](https://support.microsoft.com/help/4556813) - [KB4556813](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556813)<br>[None](https://support.microsoft.com/help/4556826) - [KB4556826](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556826)<br>[None](https://support.microsoft.com/help/4556836) - [KB4556836](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556836)<br>[None](https://support.microsoft.com/help/4556840) - [KB4556840](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556840)<br>[None](https://support.microsoft.com/help/4556843) - [KB4556843](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556843)<br>[None](https://support.microsoft.com/help/4556846) - [KB4556846](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556846)<br>[None](https://support.microsoft.com/help/4556852) - [KB4556852](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556852)<br>[None](https://support.microsoft.com/help/4556853) - [KB4556853](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556853)<br>[None](https://support.microsoft.com/help/4556854) - [KB4556854](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556854)<br>[None](https://support.microsoft.com/help/4556860) - [KB4556860](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556860)</details>|Peleg Hadar (<a href="https://twitter.com/peleghd">@peleghd</a>) and Tomer Bar of SafeBreach Labs|
|[CVE-2020-1030](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1030)|An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka &#x27;Windows Print Spooler Elevation of Privilege Vulnerability&#x27;.  |[2020-09-08T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1030)|<details>[None](https://support.microsoft.com/help/4570333) - [KB4570333](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4570333)<br>[None](https://support.microsoft.com/help/4571756) - [KB4571756](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571756)<br>[None](https://support.microsoft.com/help/4574727) - [KB4574727](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4574727)<br>[None](https://support.microsoft.com/help/4577015) - [KB4577015](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577015)<br>[None](https://support.microsoft.com/help/4577032) - [KB4577032](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577032)<br>[None](https://support.microsoft.com/help/4577038) - [KB4577038](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577038)<br>[None](https://support.microsoft.com/help/4577041) - [KB4577041](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577041)<br>[None](https://support.microsoft.com/help/4577048) - [KB4577048](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577048)<br>[None](https://support.microsoft.com/help/4577049) - [KB4577049](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577049)<br>[None](https://support.microsoft.com/help/4577051) - [KB4577051](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577051)<br>[None](https://support.microsoft.com/help/4577053) - [KB4577053](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577053)<br>[None](https://support.microsoft.com/help/4577064) - [KB4577064](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577064)<br>[None](https://support.microsoft.com/help/4577066) - [KB4577066](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577066)<br>[None](https://support.microsoft.com/help/4577070) - [KB4577070](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577070)<br>[None](https://support.microsoft.com/help/4577071) - [KB4577071](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577071)</details>|<a href="https://twitter.com/offenseindepth">Victor Mata</a> of FusionX, Accenture Security<br>JeongOh Kyea <a href="https://twitter.com/kkokkokye">(@kkokkokye)</a> of THEORI|
|[CVE-2019-0759](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0759)|An information disclosure vulnerability exists when the Windows Print Spooler does not properly handle objects in memory, aka &#x27;Windows Print Spooler Information Disclosure Vulnerability&#x27;.  |[2019-03-12T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2019-0759)|<details>[None](https://support.microsoft.com/help/4489868) - [KB4489868](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489868)<br>[None](https://support.microsoft.com/help/4489871) - [KB4489871](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489871)<br>[None](https://support.microsoft.com/help/4489872) - [KB4489872](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489872)<br>[None](https://support.microsoft.com/help/4489876) - [KB4489876](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489876)<br>[None](https://support.microsoft.com/help/4489878) - [KB4489878](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489878)<br>[None](https://support.microsoft.com/help/4489880) - [KB4489880](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489880)<br>[None](https://support.microsoft.com/help/4489881) - [KB4489881](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489881)<br>[None](https://support.microsoft.com/help/4489882) - [KB4489882](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489882)<br>[None](https://support.microsoft.com/help/4489883) - [KB4489883](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489883)<br>[None](https://support.microsoft.com/help/4489884) - [KB4489884](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489884)<br>[None](https://support.microsoft.com/help/4489885) - [KB4489885](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489885)<br>[None](https://support.microsoft.com/help/4489886) - [KB4489886](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489886)<br>[None](https://support.microsoft.com/help/4489891) - [KB4489891](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489891)<br>[None](https://support.microsoft.com/help/4489899) - [KB4489899](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489899)</details>|<a href="https://twitter.com/klotxl404">Ke Liu</a> of <a href="https://xlab.tencent.com/en/">Tencent Security Xuanwu Lab</a>|
|[CVE-2016-3239](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3239)|The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via vectors involving filesystem write operations, aka &quot;Windows Print Spooler Elevation of Privilege Vulnerability.&quot;  |[2016-07-12T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2016-3239)|<details>[None](https://support.microsoft.com/help/3163912) - [KB3163912](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3163912)<br>[None](https://support.microsoft.com/help/3163912) - [KB3163912](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3163912)<br>[None](https://support.microsoft.com/help/3172985) - [KB3172985](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3172985)<br>[None](https://support.microsoft.com/help/3172985) - [KB3172985](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3172985)</details>|None<br><a href="https://linkedin.com/in/shanti-lindstr%c3%b6m-399112a8">Shanti Lindström</a>, Individual|
|[CVE-2016-3238](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3238)|The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka &quot;Windows Print Spooler Remote Code Execution Vulnerability.&quot;  |[2016-07-12T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2016-3238)|<details>[None](https://support.microsoft.com/help/3170455) - [KB3170455](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3170455)<br>[None](https://support.microsoft.com/help/3170455) - [KB3170455](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3170455)<br>[None](https://support.microsoft.com/help/3170455) - [KB3170455](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3170455)<br>[None](https://support.microsoft.com/help/3170455) - [KB3170455](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3170455)<br>[None](https://support.microsoft.com/help/3170455) - [KB3170455](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3170455)<br>[None](https://support.microsoft.com/help/4038777) - [KB4038777](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038777)<br>[None](https://support.microsoft.com/help/4038777) - [KB4038777](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038777)<br>[None](https://support.microsoft.com/help/4038777) - [KB4038777](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038777)<br>[None](https://support.microsoft.com/help/4038777) - [KB4038777](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038777)<br>[None](https://support.microsoft.com/help/4038777) - [KB4038777](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038777)<br>[None](https://support.microsoft.com/help/4038779) - [KB4038779](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038779)<br>[None](https://support.microsoft.com/help/4038779) - [KB4038779](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038779)<br>[None](https://support.microsoft.com/help/4038779) - [KB4038779](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038779)<br>[None](https://support.microsoft.com/help/4038779) - [KB4038779](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038779)<br>[None](https://support.microsoft.com/help/4038779) - [KB4038779](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038779)<br>[None](https://support.microsoft.com/help/4038781) - [KB4038781](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038781)<br>[None](https://support.microsoft.com/help/4038781) - [KB4038781](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038781)<br>[None](https://support.microsoft.com/help/4038782) - [KB4038782](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038782)<br>[None](https://support.microsoft.com/help/4038782) - [KB4038782](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038782)<br>[None](https://support.microsoft.com/help/4038782) - [KB4038782](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038782)<br>[None](https://support.microsoft.com/help/4038782) - [KB4038782](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038782)<br>[None](https://support.microsoft.com/help/4038783) - [KB4038783](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038783)<br>[None](https://support.microsoft.com/help/4038783) - [KB4038783](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038783)<br>[None](https://support.microsoft.com/help/4038786) - [KB4038786](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038786)<br>[None](https://support.microsoft.com/help/4038786) - [KB4038786](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038786)<br>[None](https://support.microsoft.com/help/4038792) - [KB4038792](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038792)<br>[None](https://support.microsoft.com/help/4038792) - [KB4038792](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038792)<br>[None](https://support.microsoft.com/help/4038792) - [KB4038792](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038792)<br>[None](https://support.microsoft.com/help/4038792) - [KB4038792](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038792)<br>[None](https://support.microsoft.com/help/4038793) - [KB4038793](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038793)<br>[None](https://support.microsoft.com/help/4038793) - [KB4038793](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038793)<br>[None](https://support.microsoft.com/help/4038793) - [KB4038793](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038793)<br>[None](https://support.microsoft.com/help/4038793) - [KB4038793](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038793)<br>[None](https://support.microsoft.com/help/4038799) - [KB4038799](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038799)<br>[None](https://support.microsoft.com/help/4038799) - [KB4038799](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038799)</details>|<a href="http://blog.vectranetworks.com/blog/microsoft-windows-printer-wateringhole-attack">Nicolas Beauchesne</a> of Vectra Networks|
|[CVE-2013-1339](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1339)|The Print Spooler in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly manage memory during deletion of printer connections, which allows remote authenticated users to execute arbitrary code via a crafted request, aka &quot;Print Spooler Vulnerability.&quot;  |None|<details></details>||
|[CVE-2013-0011](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0011)|The Print Spooler in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted print job, aka &quot;Windows Print Spooler Components Vulnerability.&quot;  |None|<details></details>||
|[CVE-2012-1851](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1851)|Format string vulnerability in the Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted response, aka &quot;Print Spooler Service Format String Vulnerability.&quot;  |None|<details></details>||
|[CVE-2010-2729](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2729)|The Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when printer sharing is enabled, does not properly validate spooler access permissions, which allows remote attackers to create files in a system directory, and consequently execute arbitrary code, by sending a crafted print request over RPC, as exploited in the wild in September 2010, aka &quot;Print Spooler Service Impersonation Vulnerability.&quot;  |None|<details></details>||
|[CVE-2009-0230](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0230)|The Windows Print Spooler in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows remote authenticated users to gain privileges via a crafted RPC message that triggers loading of a DLL file from an arbitrary directory, aka &quot;Print Spooler Load Library Vulnerability.&quot;  |None|<details></details>||
|[CVE-2009-0229](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0229)|The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows local users to read arbitrary files via a crafted separator page, aka &quot;Print Spooler Read File Vulnerability.&quot;  |None|<details></details>||
|[CVE-2009-0228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0228)|Stack-based buffer overflow in the EnumeratePrintShares function in Windows Print Spooler Service (win32spl.dll) in Microsoft Windows 2000 SP4 allows remote printer servers to execute arbitrary code via a crafted ShareName in a response to an RPC request, related to &quot;printing data structures,&quot; aka &quot;Buffer Overflow in Print Spooler Vulnerability.&quot;  |None|<details></details>||
|[CVE-2006-6296](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6296)|The RpcGetPrinterData function in the Print Spooler (spoolsv.exe) service in Microsoft Windows 2000 SP4 and earlier, and possibly Windows XP SP1 and earlier, allows remote attackers to cause a denial of service (memory consumption) via an RPC request that specifies a large &#x27;offered&#x27; value (output buffer size), a variant of CVE-2005-3644.  |None|<details></details>||
|[CVE-2005-1984](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1984)|Buffer overflow in the Print Spooler service (Spoolsv.exe) for Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code via a malicious message.  |None|<details></details>||
|[CVE-2001-1451](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1451)|Memory leak in the SNMP LAN Manager (LANMAN) MIB extension for Microsoft Windows 2000 before SP3, when the Print Spooler is not running, allows remote attackers to cause a denial of service (memory consumption) via a large number of GET or GETNEXT requests.  |None|<details></details>||
|[CVE-1999-0899](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0899)|The Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropriate permissions that allow the user to specify an alternate print provider.  |None|<details></details>||
|[CVE-1999-0898](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0898)|Buffer overflows in Windows NT 4.0 print spooler allow remote attackers to gain privileges or cause a denial of service via a malformed spooler request.  |None|<details></details>||


CVE table available: Windows-print-spooler-table.md

Building gantt chart...

mermaid
gantt

title Windows print spooler
dateFormat YYYY-MM-DD
axisFormat %Y-%m

section CVE Release Dates
section 2022-Mar
CVE-2022-23284 :cve0, 2022-03-08, 30d
section 2022-Feb
CVE-2022-22718 :cve1, 2022-02-08, 30d
CVE-2022-22717 :cve2, 2022-02-08, 30d
CVE-2022-21999 :cve3, 2022-02-08, 30d
CVE-2022-21997 :cve4, 2022-02-08, 30d
section 2021-Dec
CVE-2021-41333 :cve5, 2021-12-14, 30d
section 2021-Oct
CVE-2021-41332 :cve6, 2021-10-12, 30d
CVE-2021-36970 :cve10, 2021-10-12, 30d
section 2021-Sep
CVE-2021-40447 :cve7, 2021-09-14, 30d
CVE-2021-38671 :cve8, 2021-09-14, 30d
CVE-2021-38667 :cve9, 2021-09-14, 30d
section 2021-Aug
CVE-2021-36958 :cve11, 2021-08-10, 30d
CVE-2021-36947 :cve12, 2021-08-10, 30d
CVE-2021-36936 :cve13, 2021-08-10, 30d
CVE-2021-34483 :cve15, 2021-08-10, 30d
section 2021-Jul
CVE-2021-34527 :cve14, 2021-07-13, 30d
CVE-2021-34481 :cve16, 2021-07-13, 30d
section 2021-Mar
CVE-2021-26878 :cve17, 2021-03-09, 30d
CVE-2021-1640 :cve20, 2021-03-09, 30d
section 2021-Jan
CVE-2021-1695 :cve18, 2021-01-12, 30d
section 2021-Jun
CVE-2021-1675 :cve19, 2021-06-08, 30d
section 2020-Nov
CVE-2020-17042 :cve21, 2020-11-10, 30d
CVE-2020-17014 :cve22, 2020-11-10, 30d
CVE-2020-17001 :cve23, 2020-11-10, 30d
section 2020-Aug
CVE-2020-1337 :cve24, 2020-08-11, 30d
section 2020-May
CVE-2020-1070 :cve25, 2020-05-12, 30d
CVE-2020-1048 :cve26, 2020-05-12, 30d
section 2020-Sep
CVE-2020-1030 :cve27, 2020-09-08, 30d
section 2019-Mar
CVE-2019-0759 :cve28, 2019-03-12, 30d
section 2016-Jul
CVE-2016-3239 :cve29, 2016-07-12, 30d
CVE-2016-3238 :cve30, 2016-07-12, 30d
section 2013
CVE-2013-1339 :cve31, 2013-01-01, 30d
CVE-2013-0011 :cve32, 2013-01-01, 30d
section 2012
CVE-2012-1851 :cve33, 2012-01-01, 30d
section 2010
CVE-2010-2729 :cve34, 2010-01-01, 30d
section 2009
CVE-2009-0230 :cve35, 2009-01-01, 30d
CVE-2009-0229 :cve36, 2009-01-01, 30d
CVE-2009-0228 :cve37, 2009-01-01, 30d
section 2006
CVE-2006-6296 :cve38, 2006-01-01, 30d
section 2005
CVE-2005-1984 :cve39, 2005-01-01, 30d
section 2001
CVE-2001-1451 :cve40, 2001-01-01, 30d
section 1999
CVE-1999-0899 :cve41, 1999-01-01, 30d
CVE-1999-0898 :cve42, 1999-01-01, 30d



Gannt chart available: Windows-print-spooler-gannt.md

Charts Generated

Gannt Chart

gantt

title Windows print spooler
dateFormat YYYY-MM-DD
axisFormat %Y-%m

section CVE Release Dates
section 2022-Mar
CVE-2022-23284 :cve0, 2022-03-08, 30d
section 2022-Feb
CVE-2022-22718 :cve1, 2022-02-08, 30d
CVE-2022-22717 :cve2, 2022-02-08, 30d
CVE-2022-21999 :cve3, 2022-02-08, 30d
CVE-2022-21997 :cve4, 2022-02-08, 30d
section 2021-Dec
CVE-2021-41333 :cve5, 2021-12-14, 30d
section 2021-Oct
CVE-2021-41332 :cve6, 2021-10-12, 30d
CVE-2021-36970 :cve10, 2021-10-12, 30d
section 2021-Sep
CVE-2021-40447 :cve7, 2021-09-14, 30d
CVE-2021-38671 :cve8, 2021-09-14, 30d
CVE-2021-38667 :cve9, 2021-09-14, 30d
section 2021-Aug
CVE-2021-36958 :cve11, 2021-08-10, 30d
CVE-2021-36947 :cve12, 2021-08-10, 30d
CVE-2021-36936 :cve13, 2021-08-10, 30d
CVE-2021-34483 :cve15, 2021-08-10, 30d
section 2021-Jul
CVE-2021-34527 :cve14, 2021-07-13, 30d
CVE-2021-34481 :cve16, 2021-07-13, 30d
section 2021-Jun
CVE-2021-1675 :cve19, 2021-06-08, 30d
section 2021-Mar
CVE-2021-26878 :cve17, 2021-03-09, 30d
CVE-2021-1640 :cve20, 2021-03-09, 30d
section 2021-Jan
CVE-2021-1695 :cve18, 2021-01-12, 30d
section 2020-Nov
CVE-2020-17042 :cve21, 2020-11-10, 30d
CVE-2020-17014 :cve22, 2020-11-10, 30d
CVE-2020-17001 :cve23, 2020-11-10, 30d
section 2020-Sep
CVE-2020-1030 :cve27, 2020-09-08, 30d
section 2020-Aug
CVE-2020-1337 :cve24, 2020-08-11, 30d
section 2020-May
CVE-2020-1070 :cve25, 2020-05-12, 30d
CVE-2020-1048 :cve26, 2020-05-12, 30d
section 2019-Mar
CVE-2019-0759 :cve28, 2019-03-12, 30d
section 2016-Jul
CVE-2016-3239 :cve29, 2016-07-12, 30d
CVE-2016-3238 :cve30, 2016-07-12, 30d
section 2013-Jan
CVE-2013-1339 :cve31, 2013-01-01, 30d
CVE-2013-0011 :cve32, 2013-01-01, 30d
section 2012-Jan
CVE-2012-1851 :cve33, 2012-01-01, 30d
section 2010-Jan
CVE-2010-2729 :cve34, 2010-01-01, 30d
section 2009-Jan
CVE-2009-0230 :cve35, 2009-01-01, 30d
CVE-2009-0229 :cve36, 2009-01-01, 30d
CVE-2009-0228 :cve37, 2009-01-01, 30d
section 2006-Jan
CVE-2006-6296 :cve38, 2006-01-01, 30d
section 2005-Jan
CVE-2005-1984 :cve39, 2005-01-01, 30d
section 2001-Jan
CVE-2001-1451 :cve40, 2001-01-01, 30d
section 1999-Jan
CVE-1999-0899 :cve41, 1999-01-01, 30d
CVE-1999-0898 :cve42, 1999-01-01, 30d

Markdown Table

CVE Description Release Date KBs Acknowledgments
CVE-2022-23284 Windows Print Spooler Elevation of Privilege Vulnerability. 2022-03-08T08:00:00Z
10.0.10240.19235 - KB5011491
10.0.14393.5006 - KB5011495
10.0.17763.2686 - KB5011503
10.0.18363.2158 - KB5011485
10.0.19042.1586 - KB5011487
10.0.19043.1586 - KB5011487
10.0.19044.1586 - KB5011487
10.0.20348.580 - KB5011580
10.0.20348.587 - KB5011497
10.0.22000.556 - KB5011493
6.2.9200.23639 - KB5011527
6.2.9200.23645 - KB5011535
6.3.9600.20303 - KB5011560
6.3.9600.20303 - KB5011564
JeongOh Kyea with THEORI
CVE-2022-22718 Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21997, CVE-2022-21999, CVE-2022-22717. 2022-02-08T08:00:00Z
10.0.10240.19204 - KB5010358
10.0.14393.4946 - KB5010359
10.0.17763.2565 - KB5010351
10.0.18363.2094 - KB5010345
10.0.19042.1526 - KB5010342
10.0.19043.1526 - KB5010342
10.0.19044.1526 - KB5010342
10.0.20348.524 - KB5010354
10.0.20348.525 - KB5010456
10.0.22000.493 - KB5010386
6.0.6003.21372 - KB5010403
6.0.6003.21374 - KB5010384
6.1.7601.25860 - KB5010404
6.1.7601.25860 - KB5010422
6.2.9200.23605 - KB5010392
6.2.9200.23605 - KB5010412
6.3.9600.20269 - KB5010395
6.3.9600.20269 - KB5010419
NSFOCUS TIANJI Lab via TianfuCup
CVE-2022-22717 Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21997, CVE-2022-21999, CVE-2022-22718. 2022-02-08T08:00:00Z
10.0.10240.19204 - KB5010358
10.0.14393.4946 - KB5010359
10.0.17763.2565 - KB5010351
10.0.18363.2094 - KB5010345
10.0.19042.1526 - KB5010342
10.0.19043.1526 - KB5010342
10.0.19044.1526 - KB5010342
10.0.20348.524 - KB5010354
10.0.20348.525 - KB5010456
10.0.22000.493 - KB5010386
6.0.6003.21372 - KB5010403
6.0.6003.21374 - KB5010384
6.1.7601.25860 - KB5010404
6.1.7601.25860 - KB5010422
6.2.9200.23605 - KB5010392
6.2.9200.23605 - KB5010412
6.3.9600.20269 - KB5010395
6.3.9600.20269 - KB5010419
Thibault Van Geluwe de Berlaere with Mandiant
CVE-2022-21999 Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21997, CVE-2022-22717, CVE-2022-22718. 2022-02-08T08:00:00Z
10.0.10240.19204 - KB5010358
10.0.14393.4946 - KB5010359
10.0.17763.2565 - KB5010351
10.0.18363.2094 - KB5010345
10.0.19042.1526 - KB5010342
10.0.19043.1526 - KB5010342
10.0.19044.1526 - KB5010342
10.0.20348.524 - KB5010354
10.0.20348.525 - KB5010456
10.0.22000.493 - KB5010386
6.0.6003.21372 - KB5010403
6.0.6003.21374 - KB5010384
6.1.7601.25860 - KB5010404
6.1.7601.25860 - KB5010422
6.2.9200.23605 - KB5010392
6.2.9200.23605 - KB5010412
6.3.9600.20269 - KB5010395
6.3.9600.20269 - KB5010419
Xuefeng Li (@lxf02942370) & Zhiniang Peng (@edwardzpeng) of Sangfor Via Tianfu CUP
Oliver Lyak with Institut For Cyber Risk
CVE-2022-21997 Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21999, CVE-2022-22717, CVE-2022-22718. 2022-02-08T08:00:00Z
10.0.10240.19204 - KB5010358
10.0.14393.4946 - KB5010359
10.0.17763.2565 - KB5010351
10.0.18363.2094 - KB5010345
10.0.19042.1526 - KB5010342
10.0.19043.1526 - KB5010342
10.0.19044.1526 - KB5010342
10.0.20348.524 - KB5010354
10.0.20348.525 - KB5010456
10.0.22000.493 - KB5010386
6.0.6003.21372 - KB5010403
6.0.6003.21374 - KB5010384
6.1.7601.25860 - KB5010404
6.1.7601.25860 - KB5010422
6.2.9200.23605 - KB5010392
6.2.9200.23605 - KB5010412
6.3.9600.20269 - KB5010395
6.3.9600.20269 - KB5010419
Bo Wu
CVE-2021-41333 Windows Print Spooler Elevation of Privilege Vulnerability 2021-12-14T08:00:00Z
10.0.10240.19145 - KB5008230
10.0.14393.4825 - KB5008207
10.0.17763.2366 - KB5008218
10.0.18363.1977 - KB5008206
10.0.19041.1415 - KB5008212
10.0.19042.1415 - KB5008212
10.0.19043.1415 - KB5008212
10.0.19044.1415 - KB5008212
10.0.20348.405 - KB5008223
10.0.22000.376 - KB5008215
6.0.6003.21309 - KB5008271
6.0.6003.21309 - KB5008274
6.1.7601.25796 - KB5008244
6.1.7601.25796 - KB5008282
6.2.9200.23540 - KB5008255
6.2.9200.23545 - KB5008277
6.3.9600.20207 - KB5008263
6.3.9600.20207 - KB5008285
James Forshaw of Google Project Zero
Abdelhamid Naceri working with Trend Micro Zero Day Initiative
CVE-2021-41332 Windows Print Spooler Information Disclosure Vulnerability 2021-10-12T07:00:00Z
10.0.10240.19086 - KB5006675
10.0.14393.4704 - KB5006669
10.0.17763.2237 - KB5006672
10.0.18363.1854 - KB5006667
10.0.19041.1288 - KB5006670
10.0.19042.1288 - KB5006670
10.0.20348.288 - KB5006699
10.0.22000.258 - KB5006674
6.0.6003.21251 - KB5006715
6.0.6003.21251 - KB5006736
6.1.7601.25740 - KB5006728
6.1.7601.25740 - KB5006743
6.2.9200.23490 - KB5006732
6.2.9200.23490 - KB5006739
6.3.9600.20144 - KB5006714
6.3.9600.20144 - KB5006729
Liubenjin with Codesafe Team of Legendsec at Qi'anxin Group
CVE-2021-40447 Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38667, CVE-2021-38671. 2021-09-14T07:00:00Z
10.0.10240.19060 - KB5005569
10.0.14393.4651 - KB5005573
10.0.17763.2183 - KB5005568
10.0.18363.1801 - KB5005566
10.0.19043.1237 - KB5005565
10.0.20348.230 - KB5005575
6.0.6003.21218 - KB5005606
6.0.6003.21218 - KB5005618
6.1.7601.25712 - KB5005615
6.1.7601.25712 - KB5005633
6.2.9200.23462 - KB5005607
6.2.9200.23462 - KB5005623
6.3.9600.20120 - KB5005613
6.3.9600.20120 - KB5005627
CVE-2021-38671 Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38667, CVE-2021-40447. 2021-09-14T07:00:00Z
10.0.10240.19060 - KB5005569
10.0.14393.4651 - KB5005573
10.0.17763.2183 - KB5005568
10.0.18363.1801 - KB5005566
10.0.19043.1237 - KB5005565
10.0.20348.230 - KB5005575
6.0.6003.21218 - KB5005606
6.0.6003.21218 - KB5005618
6.1.7601.25712 - KB5005615
6.1.7601.25712 - KB5005633
6.2.9200.23462 - KB5005607
6.2.9200.23462 - KB5005623
6.3.9600.20120 - KB5005613
6.3.9600.20120 - KB5005627
Thibault Van Geluwe de Berlaere with Mandiant
CVE-2021-38667 Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38671, CVE-2021-40447. 2021-09-14T07:00:00Z
10.0.10240.19060 - KB5005569
10.0.14393.4651 - KB5005573
10.0.17763.2183 - KB5005568
10.0.18363.1801 - KB5005566
10.0.19043.1237 - KB5005565
10.0.20348.230 - KB5005575
6.0.6003.21218 - KB5005606
6.0.6003.21218 - KB5005618
6.1.7601.25712 - KB5005615
6.1.7601.25712 - KB5005633
6.2.9200.23462 - KB5005607
6.2.9200.23462 - KB5005623
6.3.9600.20120 - KB5005613
6.3.9600.20120 - KB5005627
CVE-2021-36970 Windows Print Spooler Spoofing Vulnerability 2021-10-12T07:00:00Z
10.0.10240.19086 - KB5006675
10.0.14393.4704 - KB5006669
10.0.17763.2237 - KB5006672
10.0.18363.1854 - KB5006667
10.0.19041.1288 - KB5006670
10.0.19042.1288 - KB5006670
10.0.20348.288 - KB5006699
10.0.22000.258 - KB5006674
6.0.6003.21251 - KB5006715
6.0.6003.21251 - KB5006736
6.1.7601.25740 - KB5006728
6.1.7601.25740 - KB5006743
6.2.9200.23490 - KB5006732
6.2.9200.23490 - KB5006739
6.3.9600.20144 - KB5006714
6.3.9600.20144 - KB5006729
XueFeng Li and Zhiniang Peng with Sangfor
CVE-2021-36958 Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36936, CVE-2021-36947. 2021-08-10T07:00:00Z
10.0.10240.19060 - KB5005569
10.0.14393.4651 - KB5005573
10.0.17763.2183 - KB5005568
10.0.18363.1801 - KB5005566
10.0.19041.1237 - KB5005565
10.0.19042.1237 - KB5005565
10.0.19043.1237 - KB5005565
6.0.6003.21218 - KB5005606
6.0.6003.21218 - KB5005618
6.1.7601.25712 - KB5005615
6.1.7601.25712 - KB5005633
6.2.9200.23462 - KB5005607
6.2.9200.23462 - KB5005623
6.3.9600.20120 - KB5005613
6.3.9600.20120 - KB5005627
Victor Mata of FusionX, Accenture Security
CVE-2021-36947 Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36936, CVE-2021-36958. 2021-08-10T07:00:00Z
10.0.10240.19022 - KB5005040
10.0.14393.4583 - KB5005043
10.0.17763.2114 - KB5005030
10.0.18363.1734 - KB5005031
10.0.19041.1165 - KB5005033
10.0.19042.1165 - KB5005033
10.0.19043.1165 - KB5005033
6.0.6003.21192 - KB5005090
6.0.6003.21192 - KB5005095
6.1.7601.25685 - KB5005088
6.1.7601.25685 - KB5005089
6.2.9200.23435 - KB5005094
6.2.9200.23435 - KB5005099
6.3.9600.20094 - KB5005076
6.3.9600.20094 - KB5005106
CVE-2021-36936 Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36947, CVE-2021-36958. 2021-08-10T07:00:00Z
10.0.10240.19022 - KB5005040
10.0.14393.4583 - KB5005043
10.0.17763.2114 - KB5005030
10.0.18363.1734 - KB5005031
10.0.19041.1165 - KB5005033
10.0.19042.1165 - KB5005033
10.0.19043.1165 - KB5005033
6.0.6003.21192 - KB5005090
6.0.6003.21192 - KB5005095
6.1.7601.25685 - KB5005088
6.1.7601.25685 - KB5005089
6.2.9200.23435 - KB5005094
6.2.9200.23435 - KB5005099
6.3.9600.20094 - KB5005076
6.3.9600.20094 - KB5005106
CVE-2021-34527 Windows Print Spooler Remote Code Execution Vulnerability 2021-07-13T07:00:00Z
10.0.10240.18969 - KB5004950
10.0.17763.2029 - KB5004947
10.0.18363.1646 - KB5004946
10.0.19041.1083 - KB5004945
10.0.19042.1083 - KB5004945
10.0.19043.1083 - KB5004945
6.0.6003.21138 - KB5004955
6.0.6003.21138 - KB5004959
6.1.7601.25633 - KB5004951
6.1.7601.25633 - KB5004953
6.3.9600.20046 - KB5004954
6.3.9600.20046 - KB5004958
None - KB5004948
None - KB5004956
None - KB5004960
Zhiniang Peng (@edwardzpeng) and Xuefeng Li (@lxf02942370)
CVE-2021-34483 Windows Print Spooler Elevation of Privilege Vulnerability 2021-08-10T07:00:00Z
10.0.10240.19022 - KB5005040
10.0.14393.4583 - KB5005043
10.0.17763.2114 - KB5005030
10.0.18363.1734 - KB5005031
10.0.19041.1165 - KB5005033
10.0.19042.1165 - KB5005033
10.0.19043.1165 - KB5005033
6.0.6003.21192 - KB5005090
6.0.6003.21192 - KB5005095
6.1.7601.25685 - KB5005088
6.1.7601.25685 - KB5005089
6.2.9200.23435 - KB5005094
6.2.9200.23435 - KB5005099
6.3.9600.20094 - KB5005076
6.3.9600.20094 - KB5005106
Thibault van Geluwe
Victor Mata of FusionX, Accenture Security
CVE-2021-34481 Windows Print Spooler Elevation of Privilege Vulnerability 2021-07-13T07:00:00Z
10.0.10240.19022 - KB5005040
10.0.14393.4583 - KB5005043
10.0.17763.2114 - KB5005030
10.0.18363.1734 - KB5005031
10.0.19041.1165 - KB5005033
10.0.19042.1165 - KB5005033
10.0.19043.1165 - KB5005033
6.0.6003.21192 - KB5005090
6.0.6003.21192 - KB5005095
6.1.7601.25685 - KB5005088
6.1.7601.25685 - KB5005089
6.2.9200.23435 - KB5005094
6.2.9200.23435 - KB5005099
6.3.9600.20094 - KB5005076
6.3.9600.20094 - KB5005106
Jacob Baines
CVE-2021-26878 Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1640. 2021-03-09T08:00:00Z
None - KB5000802
None - KB5000803
None - KB5000807
None - KB5000808
None - KB5000809
None - KB5000822
None - KB5000840
None - KB5000841
None - KB5000844
None - KB5000847
None - KB5000848
None - KB5000851
None - KB5000853
None - KB5000856
x
None
This vulnerability was discovered by Bryan de Houwer and Thibault van Geluwe de Berlaere.
CVE-2021-1695 Windows Print Spooler Elevation of Privilege Vulnerability 2021-01-12T08:00:00Z
None - KB4598229
None - KB4598230
None - KB4598231
None - KB4598242
None - KB4598243
None - KB4598245
None - KB4598275
None - KB4598278
None - KB4598279
None - KB4598285
None - KB4598287
None - KB4598288
None - KB4598289
None - KB4598297
JeongOh Kyea of THEORI working with Trend Micro Zero Day Initiative
CVE-2021-1675 Windows Print Spooler Elevation of Privilege Vulnerability 2021-06-08T07:00:00Z
10.0.10240.18967 - KB5003687
10.0.14393.4467 - KB5003638
10.0.17763.1999 - KB5003646
10.0.18363.1621 - KB5003635
10.0.19041.1052 - KB5003637
10.0.19042.1052 - KB5003637
10.0.19043.1052 - KB5003637
6.0.6003.21137 - KB5003661
6.0.6003.21137 - KB5003695
6.1.7601.25632 - KB5003667
6.1.7601.25632 - KB5003694
6.2.9200.23372 - KB5003696
6.2.9200.23372 - KB5003697
6.3.9600.20044 - KB5003681
6.3.9600.20045 - KB5003671
Yunhai Zhang of NSFOCUS TIANJI LAB https://www.nsfocus.com.cn/
Piotr Madej of AFINE
Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab 
CVE-2021-1640 Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26878. 2021-03-09T08:00:00Z
None - KB5000802
None - KB5000803
None - KB5000807
None - KB5000808
None - KB5000809
None - KB5000822
None - KB5000840
None - KB5000841
None - KB5000844
None - KB5000847
None - KB5000848
None - KB5000851
None - KB5000853
None - KB5000856
Blaz Satler and Ziga Sumenjak of 0patch
JeongOh Kyea (@kkokkokye) of THEORI working with Trend Micro Zero Day Initiative
CVE-2020-17042 Windows Print Spooler Remote Code Execution Vulnerability 2020-11-10T08:00:00Z
None - KB4586781
None - KB4586785
None - KB4586786
None - KB4586787
None - KB4586793
None - KB4586805
None - KB4586807
None - KB4586808
None - KB4586817
None - KB4586823
None - KB4586827
None - KB4586830
None - KB4586834
None - KB4586845
HyungSeok Han(@DaramG) and JeongOh Kyea(@kkokkokye) of THEORI
CVE-2020-17014 Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17001. 2020-11-10T08:00:00Z
None - KB4586781
None - KB4586785
None - KB4586786
None - KB4586787
None - KB4586793
None - KB4586805
None - KB4586807
None - KB4586808
None - KB4586817
None - KB4586823
None - KB4586827
None - KB4586830
None - KB4586834
None - KB4586845
Zhiniang Peng (@edwardzpeng & Xuefeng Li (@lxf02942370
JeongOh Kyea (@kkokkokye) of THEORI working with Trend Micro Zero Day Initiative
CVE-2020-17001 Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17014. 2020-11-10T08:00:00Z
None - KB4586781
None - KB4586785
None - KB4586786
None - KB4586787
None - KB4586793
None - KB4586805
None - KB4586807
None - KB4586808
None - KB4586817
None - KB4586823
None - KB4586827
None - KB4586830
None - KB4586834
None - KB4586845
James Forshaw of Google Project Zero
CVE-2020-1337 An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. 2020-08-11T07:00:00Z
None - KB4565349
None - KB4565351
None - KB4566782
None - KB4571692
None - KB4571694
None - KB4571702
None - KB4571703
None - KB4571709
None - KB4571719
None - KB4571723
None - KB4571729
None - KB4571730
None - KB4571736
None - KB4571741
None - KB4571746
Peleg Hadar (@peleghd) and Tomer Bar of SafeBreach Labs.
EoP Master working with iDefense Labs, Accenture.
Vte. Javier García Mayén
Junyu Zhou (@md5_salt) of Tencent Security Xuanwu Lab and Wenxu Wu
Anonymous working with Trend Micro's Zero Day Initiative
Alex Ionescu, CrowdStrike Inc.
Paolo Stagno aka VoidSec
Zhiniang Peng (@edwardzpeng) & Xuefeng Li
CVE-2020-1070 An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1048. 2020-05-12T07:00:00Z
None - KB4551853
None - KB4556799
None - KB4556807
None - KB4556812
None - KB4556813
None - KB4556826
None - KB4556836
None - KB4556840
None - KB4556843
None - KB4556846
None - KB4556852
None - KB4556853
None - KB4556854
None - KB4556860
JeongOh Kyea of THEORI
CVE-2020-1048 An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1070. 2020-05-12T07:00:00Z
None - KB4551853
None - KB4556799
None - KB4556807
None - KB4556812
None - KB4556813
None - KB4556826
None - KB4556836
None - KB4556840
None - KB4556843
None - KB4556846
None - KB4556852
None - KB4556853
None - KB4556854
None - KB4556860
Peleg Hadar (@peleghd) and Tomer Bar of SafeBreach Labs
CVE-2020-1030 An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. 2020-09-08T07:00:00Z
None - KB4570333
None - KB4571756
None - KB4574727
None - KB4577015
None - KB4577032
None - KB4577038
None - KB4577041
None - KB4577048
None - KB4577049
None - KB4577051
None - KB4577053
None - KB4577064
None - KB4577066
None - KB4577070
None - KB4577071
Victor Mata of FusionX, Accenture Security
JeongOh Kyea (@kkokkokye) of THEORI
CVE-2019-0759 An information disclosure vulnerability exists when the Windows Print Spooler does not properly handle objects in memory, aka 'Windows Print Spooler Information Disclosure Vulnerability'. 2019-03-12T07:00:00Z
None - KB4489868
None - KB4489871
None - KB4489872
None - KB4489876
None - KB4489878
None - KB4489880
None - KB4489881
None - KB4489882
None - KB4489883
None - KB4489884
None - KB4489885
None - KB4489886
None - KB4489891
None - KB4489899
Ke Liu of Tencent Security Xuanwu Lab
CVE-2016-3239 The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via vectors involving filesystem write operations, aka "Windows Print Spooler Elevation of Privilege Vulnerability." 2016-07-12T07:00:00Z
None - KB3163912
None - KB3163912
None - KB3172985
None - KB3172985
None
Shanti Lindström, Individual
CVE-2016-3238 The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka "Windows Print Spooler Remote Code Execution Vulnerability." 2016-07-12T07:00:00Z
None - KB3170455
None - KB3170455
None - KB3170455
None - KB3170455
None - KB3170455
None - KB4038777
None - KB4038777
None - KB4038777
None - KB4038777
None - KB4038777
None - KB4038779
None - KB4038779
None - KB4038779
None - KB4038779
None - KB4038779
None - KB4038781
None - KB4038781
None - KB4038782
None - KB4038782
None - KB4038782
None - KB4038782
None - KB4038783
None - KB4038783
None - KB4038786
None - KB4038786
None - KB4038792
None - KB4038792
None - KB4038792
None - KB4038792
None - KB4038793
None - KB4038793
None - KB4038793
None - KB4038793
None - KB4038799
None - KB4038799
Nicolas Beauchesne of Vectra Networks
CVE-2013-1339 The Print Spooler in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly manage memory during deletion of printer connections, which allows remote authenticated users to execute arbitrary code via a crafted request, aka "Print Spooler Vulnerability." None
CVE-2013-0011 The Print Spooler in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted print job, aka "Windows Print Spooler Components Vulnerability." None
CVE-2012-1851 Format string vulnerability in the Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted response, aka "Print Spooler Service Format String Vulnerability." None
CVE-2010-2729 The Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when printer sharing is enabled, does not properly validate spooler access permissions, which allows remote attackers to create files in a system directory, and consequently execute arbitrary code, by sending a crafted print request over RPC, as exploited in the wild in September 2010, aka "Print Spooler Service Impersonation Vulnerability." None
CVE-2009-0230 The Windows Print Spooler in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows remote authenticated users to gain privileges via a crafted RPC message that triggers loading of a DLL file from an arbitrary directory, aka "Print Spooler Load Library Vulnerability." None
CVE-2009-0229 The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows local users to read arbitrary files via a crafted separator page, aka "Print Spooler Read File Vulnerability." None
CVE-2009-0228 Stack-based buffer overflow in the EnumeratePrintShares function in Windows Print Spooler Service (win32spl.dll) in Microsoft Windows 2000 SP4 allows remote printer servers to execute arbitrary code via a crafted ShareName in a response to an RPC request, related to "printing data structures," aka "Buffer Overflow in Print Spooler Vulnerability." None
CVE-2006-6296 The RpcGetPrinterData function in the Print Spooler (spoolsv.exe) service in Microsoft Windows 2000 SP4 and earlier, and possibly Windows XP SP1 and earlier, allows remote attackers to cause a denial of service (memory consumption) via an RPC request that specifies a large 'offered' value (output buffer size), a variant of CVE-2005-3644. None
CVE-2005-1984 Buffer overflow in the Print Spooler service (Spoolsv.exe) for Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code via a malicious message. None
CVE-2001-1451 Memory leak in the SNMP LAN Manager (LANMAN) MIB extension for Microsoft Windows 2000 before SP3, when the Print Spooler is not running, allows remote attackers to cause a denial of service (memory consumption) via a large number of GET or GETNEXT requests. None
CVE-1999-0899 The Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropriate permissions that allow the user to specify an alternate print provider. None
CVE-1999-0898 Buffer overflows in Windows NT 4.0 print spooler allow remote attackers to gain privileges or cause a denial of service via a malformed spooler request. None

Current TODO

  • Add CVE chart use cases
    • CVE keyword
      • CVE list (only return strict cves)
    • KB keyword
    • Researcher keyword
  • offer tables based on mitre cves alone and enhanced MSRC data
  • add command line usage and argparse
  • Add tab complete features
    • build json data with suggestions
  • add date range filtering
  • remove mitre html scraping, replace with JSON from https://nvd.nist.gov/vuln/data-feeds#APIS
  • separate data collection and cve-markdown-charts

cve-markdown-charts's People

Contributors

clearbluejar avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar

Forkers

greg-workspace

cve-markdown-charts's Issues

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.